CVE-2023-46735 – symfony/webhook
Package
Manager: composer
Name: symfony/webhook
Vulnerable Version: >=6.3.0 <6.3.8
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
EPSS: 0.01936 pctl0.82699
Details
Symfony potential Cross-site Scripting in WebhookController ### Description The error message in WebhookController returns unescaped user-submitted input. ### Resolution WebhookController now doesn't return any user-submitted input in its response. The patch for this issue is available [here](https://github.com/symfony/symfony/commit/8128c302430394f639e818a7103b3f6815d8d962) for branch 6.3. ### Credits We would like to thank Maxime Aknin for reporting the issue and to Nicolas Grekas for providing the fix.
Metadata
Created: 2023-11-12T15:53:29Z
Modified: 2024-11-04T21:16:51Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/11/GHSA-72x2-5c85-6wmr/GHSA-72x2-5c85-6wmr.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-72x2-5c85-6wmr
Finding: F425
Auto approve: 1